Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Top Posts
Experts Reaction On World Economic Forum 2021 Report...
Major Security Flaws Found In Signal And other...
Comment On IoT Risks Of Peloton Bike
Top‌ ‌3‌ ‌Priorities‌ ‌For‌ ‌CISOs’‌ ‌2021‌ ‌Security‌ ‌Programs
The Cyber Risks Of Non-Compliance
70% of UK Finance Industry Hit With Cyber-Attacks...
A Chinese Hacking Group Is Stealing Airline Passenger...
Expert Commentary: Hacker Posts 1.9 Million Pixlr User...
NSA And Dutch NCSC Warn Outdated TLS Certs
Federal Agency Warns Cloud Attacks Are On The...
Information Security Buzz

Connecting Security Experts

  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • Register
  • Log In
Category:

News

December 16, 2020

Lookout Exposes New Spyware Used By Sextortionists To Blackmail iOS And Android Users

Android Devices Run Outdated Operating Systems
Read News
November 11, 2020

Fraudulent Minecraft-Related Apps Deceive Millions Of Google Play Users, Avast Warns

Fraudulent Minecraft-Related Apps Deceive Millions Of Google Play Users, Avast Warns
Read News
August 25, 2020

RESEARCH REVEALS INSTITUTIONAL INVESTORS ARE OPTIMISTIC ABOUT A FUTURE RISE IN THE VALUE OF BITCOIN

DDoS for Bitcoin attack
Read News
August 7, 2020

LogMeIn Introduces New LastPass Security Dashboard and Dark Web Monitoring, Delivering a Complete Command Center for Managing Digital Security

World’s 10 Hottest Cybersecurity Companies to Watch in 2016
Read News
July 21, 2020

API Security and API Sentinel

API Security and API Sentinel
Read News
July 15, 2020

ESET Discovers A Chat App Spying On Users And Leaking Stolen Data

Encryption expert NJ hospital patient data breach
Read News
July 3, 2020

F5 Fixes Critical Vulnerability Discovered by Positive Technologies in BIG-IP Application Delivery Controller

F5 Fixes Critical Vulnerability Discovered by Positive Technologies in BIG-IP Application Delivery Controller
Read News
June 29, 2020

Targeted Attacks On Industrial Companies Using Snake Ransomware

Targeted Attacks On Industrial Companies Using Snake Ransomware
Read News
June 26, 2020

200M+ Users At Risk: New Malicious .slk Files Are Bypassing Microsoft 365 Security

200M+ Users At Risk: New Malicious .slk Files Are Bypassing Microsoft 365 Security
Read News
June 26, 2020

New Cryptominer Malware is Attacking Windows and Linux Machines

New Cryptominer Malware is Attacking Windows and Linux Machines
Read News
June 25, 2020

ESET Researchers Discover New Android Ransomware, Provide A Decryptor

ESET Researchers Discover New Android Ransomware, Provide A Decryptor
Read News
June 24, 2020

Avast Reports HiddenAds Adware Campaign In 47 Apps Disguised As Games On The Google Play Store

Anti-Bouncer technique
Read News
June 24, 2020

Cloud Security Alliance Announces Availability Of Key Cloud Security Assessment And Guidance Documents In 10 Additional Languages

Cloud Security Alliance Announces Availability Of Key Cloud Security Assessment And Guidance Documents In 10 Additional Languages
Read News
June 24, 2020

ESET Researchers Discover New Android Ransomware, Provide a Decryptor

ESET Researchers Discover New Android Ransomware, Provide a Decryptor
Read News
June 15, 2020

HackerOne brings hacker-powered pentesting to European organisations

HackerOne brings hacker-powered pentesting to European organisations
Read News
June 9, 2020

CREST Report Highlights Actions to Improve Gender Diversity in the Cyber Security Industry

CREST Report Highlights Actions to Improve Gender Diversity in the Cyber Security Industry
Read News
June 4, 2020

Fraudulent iOS VPN Apps Attempt To Scam Users

Third Platform will Push CIOs to Go Smart
Read News
June 2, 2020

Past, Present And Future Of Cybercrime

cybercrime
Read News
May 27, 2020

Cyber-espionage Group Turla (a.k.a. Snake) Now Uses Gmail Web Interface For Command And Control, ESET Discovers

Cyber-espionage Group Turla (a.k.a. Snake) Now Uses Gmail Web Interface For Command And Control, ESET Discovers
Read News
March 26, 2020

DDoS Attacks Increase 180% In 2019 Compared To 2018

DDoS Attacks Increase 180% In 2019 Compared To 2018
Read News
March 17, 2020

How Mature Is Your Threat Intelligence?

How Mature Is Your Threat Intelligence?
Read News
February 4, 2020

(ISC)2 Security Congress 2020 Opens Call For Speakers

(ISC)2 Security Congress 2020 Opens Call For Speakers
Read News
January 8, 2020

Check Point Research Reveals Multiple Vulnerabilities In TikTok

Threatarmor to Strengthen Enterprise
Read News
December 20, 2019

F5 To Acquire Shape Security, Transforming Application Security

F5 To Acquire Shape Security, Transforming Application Security
Read News
December 18, 2019

Kaspersky Newsflash: Start Of Season 2 For Series “You” – Cybersecurity Expert Warns Against Underestimating Stalkerware Programs

Kaspersky Newsflash: Start Of Season 2 For Series “You” – Cybersecurity Expert Warns Against Underestimating Stalkerware Programs
Read News
December 12, 2019

IBM AI Innovations Sharpen Risk Detection In Identity Management

IBM AI Innovations Sharpen Risk Detection In Identity Management
Read News
  • 1
  • 2
  • 3
  • …
  • 114
  • ›
Loading...

SECURELY DOTTED BY

Sam Curry, Chief Security Officer, Cybereason

"Operation-centric security enables security analysts to string together disparate pieces of information involved in malicious cyber activity. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Javvad Malik, Security Awareness Advocate, KnowBe4

"Given the trends of recent years, breaches have shown no signs of slowing down. "

Experts Reaction On World Economic Forum 2021 Report Cites Cyber Failure As 4th Highest Risk

Jake Moore, Cybersecurity Specialist, ESET

"Signal is open source which makes it easier to patch and keeps costs down. "

Major Security Flaws Found In Signal And other Video Chat Apps

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

"Security risks only get introduced when you turn it on and use it. "

Comment On IoT Risks Of Peloton Bike

Matt Lock, Technical Director , Varonis

"Everyone should take some basic precautions: check settings, change default passwords and disable features you’re not using. "

Comment On IoT Risks Of Peloton Bike

Chris Hauk, Consumer Privacy Champion, Pixel Privacy

"Hackers use the login info gleaned from previous data breaches to perform credential stuffing or password spraying attacks. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"Ransomware will remain a global cyber security threat during 2021. "

70% of UK Finance Industry Hit With Cyber-Attacks In 2020

Boris Cipot, Senior Sales Engineer , Synopsys

"Cybercriminals will try to abuse every piece of information they have on you for their own personal gain. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Paul Bischoff, Privacy Advocate, Comparitech

"The fact that Chimera's activity went undiscovered for up to three months shows just how dangerous state-sponsored hackers can be. "

A Chinese Hacking Group Is Stealing Airline Passenger Details

Saryu Nayyar, CEO, Gurucul

"Two million Pixlr user accounts did not include financial information. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Pravin Rasiah, VP of Product, CloudSphere

"Businesses should invest in a cloud governance platform that provides holistic, real-time observability into the cloud landscape. "

Expert Commentary: Hacker Posts 1.9 Million Pixlr User Records For Free On Forum

Tim Callan, Chief Compliance Officer, Sectigo

"Certificate automation platforms can reduce the risk of breach of outage. "

NSA And Dutch NCSC Warn Outdated TLS Certs

Terry Greer-King, VP EMEA , SonicWall

"The only way to successfully mitigate against increasingly sophisticated attackers is to have a layered security posture. "

Federal Agency Warns Cloud Attacks Are On The Rise – How Can Businesses Stay Safe?

Jake Moore, Cybersecurity Specialist, ESET

"Passwords are in desperate need of an overhaul. "

Experts Reaction On New Chrome Update To Boost Password Security

Chris Morales, Head of Security Analytics, Vectra

"While the malware strains might slightly vary, and I’m sure more will be exposed. "

Expert Comment On New Malware Strain Found In SolarWinds Hack

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel